-5 C
Innichen
Wednesday, January 27, 2021
4.58 out of 5
4.58
3248 reviews on Udemy

The Complete Cyber Security Course : End Point Protection!

Volume 4 :Become a Cyber Security Specialist, Antivirus & Malware, Disk Encryption, Finding & Removing Hackers & Malware
Instructor:
Nathan House
English [Auto] More
An advanced practical skill-set in securing laptops, desktops and mobile devices.
Start a career in cyber security. Become a cyber security specialist.
The very latest up-to-date information and methods.
You will master the selection and implementation of solid disk encryption technology to protect devices fully from disk decryption attacks.
We cover all the diverse technologies offered by end-point-protection software; from traditional approaches, through to next generation and future technology. Covering methods like application control, execution prevention, machine learning and AI.
How to detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
How to seek and destroy system resident malware and hackers; Get up to speed on your hacker hunting!
How to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
We explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
We end by looking the extremely important topic of email and messenger security.
A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.

Learn a
practical skill-set in securing laptops, desktops and mobile devices
from all types
of threats, including, advanced hackers, trackers, exploit kits, thieves and much more.

On this course we cover end-point-protection,
which is an extremely important and hot topic in cyber security right now!

Become a cyber security specialist – Go from a beginner to advanced in this easy to
follow expert course.

Covering all the major platforms Windows, MacOS, Linux, iOS and Android.

Master the selection and
implementation of solid disk encryption technology to protect devices from disk decryption attacks.

Understand the current
and next generation anti-virus solutions, how they work, how to select the best
products and how to implement them successfully.

Covering traditional end-point-protection technologies through
to next generation and future technology; application control, execution prevention, machine
learning and Artificial Intelligence.

Learn how we can detect and
monitor for threats
such as malware and hackers through the use of security
through deception and detection technologies.

We have fun learning how to seek and
destroy system resident malware and hackers. Get up to speed on your hacker hunting!

Learn how to perform operating
system hardening
to decrease the attacker surfaces of your devices to make them
safer.

Explore the best techniques in
anti-forensics to securely delete data and meta-data so that it is
unrecoverable by even computer forensics experts.

Plus there is more. We end by looking the extremely important topic of email and messenger security.  Email has natively poor security, but in this course, I teach you how to overcome those weaknesses and fully secure your communication.

This is volume 4 of 4 of your complete guide to cybersecurity, privacy, and anonymity. 

Introduction

1
Welcome to Volume 4
2
Introduction to the Instructor!
3
Security Quick Win!
4
Target Audience
5
Study Recommendations
6
Course updates
7
Cyber Security and Ethical Hacking Careers

How to start a career in cyber security and ethical hacking.

Goals and Learning Objectives - Volume 4

1
What is End Point Protection? and why is it important?
2
Goals and Learning Objectives - Volume 4

File and Disk Encryption

1
Goals and Learning Objectives
2
Disk Encryption – What is it good for?
3
Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
4
Disk Encryption Attacks - Physical
5
Disk Encryption Attacks - Containers, Volumes and Partitions
6
Windows - Disk Encryption - An Introduction
7
Windows - Disk Encryption - Bitlocker
8
Windows - Setting Up BitLocker
9
Windows - Disk Encryption - VeraCrypt
10
Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
11
Windows, Mac & Linux - Setting up VeraCrypt
12
Mac - Filevault2
13
Mac - Setting up Filevault2
14
Linux Whole Disk Encryption - Dm-crypt and LUKS
15
Linux - Setting up DMCrypt/LUKS
16
Linux - Encrypting the boot partition with Grub2
17
Self Encrypting Drives (SEDs)
18
Defense Against Disk Decryption Attacks
19
File Encryption
20
Mandatory Key Disclosure & Plausible Deniability
21
Nesting Crypto Systems & Obfuscation
22
Case Studies in Disk Decryption

Anti-Virus and End-Point-Protection

1
Goals and Learning Objectives
2
Is Anti-Virus dead? - The Threat Landscape
3
Is Anti-Virus dead? - Protection Methods
4
Ransomware
5
Anti-Virus and End-Point-Protection Testing
6
The Problem With AV and EPP Testing
7
The Best of Business End-Point-Protection (EPP)
8
Windows - The Best of Anti-Virus and End-Point-Protection
9
Business End Point Protection (EPP)
10
Mac - XProtect
11
Mac - The Best of Anti-Virus and End-Point-Protection
12
Linux - The Best of Anti-Virus and End-Point-Protection
13
Online and Second Opinion - Anti-Virus and End-Point-Protection
14
Is Anti-Virus and End-Point-Protection Dangerous?

Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)

1
Goals and Learning Objectives
2
Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
3
End Point Detection and Response (EDR)
4
End-Point-Protection: How it works together in layers

End-Point-Protection Technology

1
Goals and Learning Objectives
2
What is application and execution control?
3
Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
4
Windows - Application control - User Account Control (UAC)
5
Windows - Application control - Software Restriction Policies
6
Windows - Application control - AppLocker
7
Windows - Application Control - Parental controls
8
Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
9
Windows - Exploitation Prevention - EMET
10
Windows - Exploitation Prevention - Traps, MBEA and HMPA
11
Windows 10 - Device Guard
12
Windows - Defender Application Guard for Microsoft Edge
13
Linux - Access Control Models
14
Linux - Security frameworks - AppArmor
15
Linux - Security frameworks - SElinux
16
Linux - Security frameworks - Grsecurity
17
Linux - Security frameworks - PaX and more
18
Linux & Mac - File permissions, POSIX and ACLs
19
Mac - Application control - Parental controls
20
Mac - Application control - Gatekeeper
21
Mac - Application control - System Integrity Protection
22
Mac - Application control - Santa
23
Mac - Application control - Xfence (Previously Little Flocker)
24
Mac - Other Stuff!
25
The New Normal For End-Point-Protection Technology
26
Cylance

Threat Detection and Monitoring

1
Goals and Learning Objectives
2
A Complete Failure to Detect Threats
3
Rethinking Honeypots
4
CanaryTokens
5
OpenCanary
6
Artillery - Binary Defense
7
Honey Drive
8
Intrusion Detection Systems (IDS) Part 1 - Methods
9
Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
10
Host-Based Intrusion Detection - OSSEC
11
Network Analysis - Sguil, Xplico & NetworkMiner
12
File Integrity Monitoring (FIM) and Checking Part 1
13
File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
14
Network Security Toolkit (NST)
15
Security Onion
16
Security Information and Event Management Software (SIEM)

Malware and Hacker Hunting on the End-Point

1
Goals and Learning Objectives
4.6
4.6 out of 5
3248 Ratings

Detailed Rating

Stars 5
2058
Stars 4
893
Stars 3
225
Stars 2
48
Stars 1
22
30-Day Money-Back Guarantee

Includes

17 hours on-demand video
1 article
Full lifetime access
Access on mobile and TV
Certificate of Completion